Internal control objectives
1-Effectiveness & efficiency of operation
2-Reliability of financial reporting
3-Compliance with laws &
regulations
4-Safeguarding Assets
Internal control 5 components CRIME
1- Environment 2-Risk 3-Activities 4-Monitoring
5-Information & communications
Classifications of system controls
General Controls
|
Application Controls
|
1-Organization & Operation
2-Procedures & Documentation
3-Hardware control
4-Access control
|
1-Input Controls
2-Processing Controls
3-Output Controls
4-Storage Controls
|
1st General
Controls
General control designed to ensure that
the company's control environment is stable and well managed. General controls include controls over the
development, modifications and maintenance
of computer programs.
1-Organization & Operation
Including Segregation of duties within computer Department and
from other Dept's as follows
System Analyst
Responsible for reviewing the
current system to make sure that it is meeting the needs of the organization.
Review current system and Provide design specification to programmer.
Should not do programming, nor should they have access to hardware
,software or data files.
Programmer
Write , test , document the system .he is able to modify programs ,data
files ,and control.
He should have No access for HW , SW that are in the actual use for
processing .
Computer Operator
Operate computer to process data
He should have No programming function and should not be able to
program.
Exam Note /:- The most
critical segregation of duties is between programmer & computer operators
Data control group
Monitor input , process , output
Have access codes & coordinate security controls with other computer
personnel.
Should be organizationally independent of computer operations.
Librarians
Maintain programs , documents , data files
He should have no access to equipment .
2-Procedures &
Documentations
including written
procedures and manuals. And also specify the process to be followed in system
development and system changes, in order to provide reasonable assurance that
development of, and changes to, computer programs are authorized, tested, and
approved prior to the use of the program.
A-SDLC System
Development Life Cycle Controls
1-Top management
commitment is needed for effective system development , this is normally
achieved through forming a ( steering committee ) for approvals and progress
review
2- Studies of Economic
, Operation , & Technical feasibility
to evaluate existing and proposed system
3- Establishing standards
for (System design and programming) stage – to match users needs
4-Changes controls
Changes
should be subject to strict controls :
Authorized written request from the user department and approved
Redesign the program using working copy (
not the original in use )
Tested by ( user , internal auditor , IT
rep )
Approval by system manager + acceptance by user .
5-The proposed program should be tested
using ( incorrect , incomplete ) and
real data to determine the proper implementation
6-Software licenses should be maintained
B-Documents
Controls
-Systems
documentation (narrative description, flowcharts, Input &output
forms ,authorizations for any changes and backup
procedures)
- programs
documentation( description of the program, program flowcharts, listings
of source code, operator instructions and controls.)
-operating documentation((information
about the performance of the program)
-
Procedural documentation(provide information about the master plan and
the handling of files)
-user documentation (all the
information a user will need to use the program)
3-Access controls(to equipment
and data)
A-Logical security
Control
access to equipment and data
Including
virus protection , firewalls , encryption
B-Physical security
For servers , , secured rooms , UPS , protection of
media library , insurance , personal badges , keys , magnetic ID cards
-File Security controls:
-External and internal file , disk , tape labeling
-Read only file attribute
-Data Base System uses (lockout ) to prevent ( deadly embrace )
Or ( preventing two applications
from updating the same record at same time )
Note: A deadly embrace occurs when two different applications or transactions
each have a lock on data that is needed by the other application or
transaction. Neither process is able to proceed, because each is waiting for
the other to do something. In these cases the system must have a method of
determining which transaction goes first, and then it must let the second
transaction be completed using the updated information after the first
transaction
-The librarian's function is
particularly critical, because documentation, programs and data files are assets of the organization
and require protection the same as any other asset would.
- Backup & contingency
In any computer system, it is essential that the
company have plans for the backup of data and the recovery of data, especially
disaster recovery. Several different processes and back-up plans function as
part of the back up and recovery plan.
1-Primary ( Backup )
►For programs and data
Using ( rollback ) to get most recent backup of
transaction log
► Backups should be stored at a
secure, remote location, so that in the event data is destroyed due to a
physical disaster, it can be reconstructed. Transmitting data electronically to
a secured backup site is called ( electronic vaulting )
►( Grand / Parent / Child ) during or after processing
work. Files from previous periods are
retained, and if a file is damaged during updating the previous
files can be used to reconstruct a new current file
-UPS (uninterruptible power supply )
For protection
in the event of power failure
2-Secondary
( Disaster recovery)
an organization should have a formal disaster recovery
plan specifies:
Which employees will participate in disaster recovery
and what their responsibilities will be ,What hardware, software, and
facilities will be used. The priority of applications that should be processed.
The different locations should be a good
distance away from the original processing site. and recovery team should each
keep a current copy of the plan at home.
Disaster recovery sites may be either
-A hot site: is a backup facility
that has a computer system similar to the one used regularly. The hot site must
be fully operational and immediately available.
- A cold site is a facility where
power and space are available to install processing equipment, but it is not
immediately available.
A mobile recovery" centers.
On a contracted basis, in the event of a disaster that destroys operations
facilities, they arrive within hours with their client's platform requirements,
to assist in recovery.
4- Hardware
control
Fault
tolerant system
Fault-Tolerant Systems are systems designed to tolerate
faults or errors. They often
utilize redundancy in hardware design, so that
if one system fails, another one will take over. Computer networks can be made
redundant in several ways:
-With two processors, the second processor can serve as
a watchdog processor. If
something happens to the primary processor, the
watchdog processor takes over.
-With multiple processors, consensus-based
protocols specify that if one processor disagrees with the others,
it should be ignored.
-A CPU could have two disks, and all data on
the first disk is mirrored on the second disk. This is called disk mirroring
or disk shadowing. Should one disk fail, the processing continues
on the good disk.
Rollback
processing may be used to prevent any transactions being written to
disk
until they are complete. If there is a power failure or
another fault during processing,
the program automatically rolls itself back to its
pre-fault state at its first opportunity.
Duplicate circuitry
is the double wiring of key hardware elements to ensure that if one program
malfunctions, the other will take over.
A redundancy check is the process
of sending repeated sets of data to confirm the
original data sent.
An echo check is
the process of sending the received data back to the sending computer to
compare what was actually sent to make sure that it is the same.
In a dual read check, data is read
twice during input and compared.
Boundary protection is
protection against unauthorized entry (read or write) to a
tape, disk or other storage device.
Graceful degradation means that if
a part of the system malfunctions, other components can be programmed to
continue the processing, although on a less efficient basis.
Overflow check means that the data
is checked and an error message activated if
data is lost through arithmetic operations that exceed
the planned capacity of the
receiving fields or registers.
D – HW controls for networks
Check point:-
( like
rollback & recovery )
To enable recovery in case of failure using check point
, taking backups several times per hour , this is recorded in a separate media
Routing verification procedures:-
Protect
against routing to wrong receiver, using header label to identify message
destination (for verification), through matching the destination code and the
message header
Message Acknowledgement
To assure message completion and sequence , using
trailer labels ( to assure receiving all parts of message )
Exam note:- Both above 2 techniques – route verification , message
acknowledgement – are used to prevent
Eavesdropping
2nd Applications controls
A – Input controls
1-Data
observation & recording
Feedback mechanism
Are manual systems like ( authorization , endorsement …..
Dual observation More than one employee sees the input
Point of sale device To encode
data automatically ( with no error )
Preprinted forms
To ensure filling all data –ex ( confirmation & receipt )
2-Data
transcription
Is preparation of data for processing ( organizing
source documents )
Preformatted input screen ex :
date filed -/ - /-
Format check ( for entering data
at proper mode ) exLnumeric data in a numeric field)
1- Edit tests
( built in programs )
Too many tests to check validity / completeness /
accuracy as follows
Completeness check All
required fields are filled
Limits Check Only
data within limit accepted
Validity check Match
input with acceptable sets
Overflow check No
of digits is below field capacity
Check digits Is
a function of other digits – to recognize errors
Key verifications inputting
again – mainly for accuracy
B ) Processing controls
1-
Data access controls
Transmittal
documents to control movement of data like batch sequence numbers (
used to number data to make sure all batches are accounted for )
Batch controls totals
to ensure that all inputs are processed correctly
Hash total A kind of sums , useful only for control
purposes , like summing customer accounts numbers.
Record Count
Counting number of transaction twice.
2-
Data manipulation controls
Software documentation like all
kind of flow charts
Compilers used to check
program language errors
Test data to test computer programs
System test to test interaction of
different program
Batch balancing Compare with predetermined control total
Run to run totals
output of one process used as input to other process
Default option Auto
use of predefined value where certain value is left blank
C-Output controls
used to check that input and processing has resulted in
valid output.
1-Validating processing results
Proof listings for all changes to
master file This provides detailed information about all changes to master
files .
Reconciliations Analysis of differences between 2 files
that should be substantially the same.
Suspense Account is used as a
control total for items awaiting further processing.
Discrepancy
report is a listing of items that have violated some detective
control and need to be investigated.
Upstream
resubmission is a Submitting corrected errors again to pass by all
controls
2-Printing
output controls
Forms control like physical controls
over checks – prenumbered forms
Authorized distribution list (for
reports distribution)
Shredding Machine (when doc. No
longer needed)
D-Storage controls
Are controls that are designed to ensure that only the
data that an organization desires to be stored is actually stored – as storing
too little data is ineffective and storing too much data is inefficient
Also to ensure that data stored is accurate , valid
& virus free
Note
Preventive controls like segregation of duties ,
dual access controls , preformatted inputs ,
Detective controls like transmittal documents ,
batch control totals , check digit , limit check , validity check ,
completeness check , hash totals , turnaround documents
Corrective controls like discrepancy reports ,
upstream resubmission
Internet Security
At a minimum the
system should include
1- User Account giving
every employee account no. and password
2- Anti virus
Virus
|
Trojan horse
|
Worm
|
Program that execute itself
And replicate itself
Using host file
|
Hidden in something desirable
Do not replicate itself
|
Replicate itself but without using host file
|
Virus Hoax false
email asking you to delete system file
3-
Firewall Barrier between internal & external
network Prevent unauthorized access.
It provide protection if the hackers attempt to
misuse the data.
Proxy
server is HW + SW that creates gateway
to and from Internet
4-
Intrusion detection system is a centralized system designed to prevent
hackers from penetrating the network .
5-
Password: protect system from
unauthorized person to enter the network
6-
Encryption Convert data to code ,
then requires a key to convert back to data
Two types Secret key system
Public key / private key
The major types. of software
encryption
Public-key /private -key secret-key
use two keys as follow
:-
use one key for each pair of parties.
. Public-key widely known ex: data
encryption standards (DES)
. Private-key kept secret by recipient. is the
most prevalent secret key method
that developed by the US government.
. Flowcharting
One of the methods
available to an internal auditor for documenting his understanding of the
company's internal controls is describing them by means of a flowchart. A
flowchart also enables the auditor to identify areas in which internal controls
are required and necessary for the company.
A flowchart is used not
only to understand and describe a firm's internal controls, but also to assess
the effectiveness of those internal controls.
The main elements that are shown in a flowchart are:
Data sources (where the information comes from);
Data destinations (where the information goes);
Data flows (how the data gets there);
Transformation process (what happens to the data); and
Data storage (how the
data is stored for the long term)
There are two main types of flowcharts.
1)A systems, or horizontal flowchart,
shows the different
departments or functions involved in a process, horizontally .It documents the
manual processes as well as the computer processes and the input, output and
processing steps.
2)A program, or vertical flowchart:
depicts the specific steps in a process and
how they will be executed. It does not, however, usually show the system
components as clearly as a horizontal flowchart. This type of flowchart is not
used much now.
A
data flow diagram is a
graphic illustration (symbolic) of a system's processes and data flows.-
Note:
Computers have made the
process of initially creating a flowchart and updating a flowchart much easier.
Because of this, you do not need to be familiar with the drawing of or the
symbols used in a flowchart.
Comments (0)
إرسال تعليق